From 91b0aee350fe7f811f3193e66b6a6a485dfdaf1f Mon Sep 17 00:00:00 2001 From: Jordan Mynes Date: Wed, 9 Apr 2025 13:18:55 -0500 Subject: [PATCH] fix: should be 40 characters, not 20 also updated example key to be more obviously an example --- user/security-in-qubes/mfa.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/user/security-in-qubes/mfa.md b/user/security-in-qubes/mfa.md index 95f07044..8b539440 100644 --- a/user/security-in-qubes/mfa.md +++ b/user/security-in-qubes/mfa.md @@ -207,16 +207,16 @@ website](https://docs.nitrokey.com/software/nitropy/all-platforms/installation). YubiKey](https://www.qubes-os.org/doc/how-to-use-usb-devices/) to this app qube though) or directly on the sys-usb vm. - This command will configure your Yubikey, given a 20 character (all lowercase) secret key, like the example below: + This command will configure your Yubikey, given a 40 character (all lowercase) secret key, like the example below: - `ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -a 303132333435363738393a3b3c3d3e3f40414243` + `ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -a 0123456789abcdef0123456789abcdef01234567` With the following settings: - Configuration Slot: `2`, - Challenge-Response Mode: `HMAC-SHA1`, - Require usser input (Optional, but Recommended): `true`, - HMAC-SHA1 Mode: `fixed 64 bit input` - - Secret Key (example): `303132333435363738393a3b3c3d3e3f40414243` + - Secret Key (example): `0123456789abcdef0123456789abcdef01234567` **Yubikey (via GUI)**